Movatterモバイル変換


[0]ホーム

URL:


US20210133615A1 - Matrix-based quantum-resilient server-cluster - Google Patents

Matrix-based quantum-resilient server-cluster
Download PDF

Info

Publication number
US20210133615A1
US20210133615A1US16/670,907US201916670907AUS2021133615A1US 20210133615 A1US20210133615 A1US 20210133615A1US 201916670907 AUS201916670907 AUS 201916670907AUS 2021133615 A1US2021133615 A1US 2021133615A1
Authority
US
United States
Prior art keywords
silicon
quantum
cluster
matrix
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/670,907
Other versions
US11468356B2 (en
Inventor
Elena Kvochko
Maria Carolina Barraza Enciso
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of America Corp
Original Assignee
Bank of America Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of America CorpfiledCriticalBank of America Corp
Priority to US16/670,907priorityCriticalpatent/US11468356B2/en
Assigned to BANK OF AMERICA CORPORATIONreassignmentBANK OF AMERICA CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BARRAZA ENCISO, MARIA CAROLINA, KVOCHKO, ELENA
Publication of US20210133615A1publicationCriticalpatent/US20210133615A1/en
Application grantedgrantedCritical
Publication of US11468356B2publicationCriticalpatent/US11468356B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods for randomly storing data received at a plurality of silicon-based devices included in a matrix-computer-cluster are provided. The silicon-based devices may be arranged in predetermined rows within the matrix-computer-cluster. The matrix-computer-cluster may include a matrix formation of x, y and z coordinates. Methods may encapsulate a first device in a first quantum case. Methods may receive a data element at the first device. Methods may intercept the data element at the first case. Methods may generate a random number sequence at a first quantum random number generator included in the first case. The random number sequence may identify a set of x, y and z coordinates. Methods may determine a second device located within the matrix-computer-cluster that corresponds to the identified set of x, y and z coordinates. Methods may include transmitting the data element to second device, and storing the data element at the second device.

Description

Claims (20)

What is claimed is:
1. A matrix-computer-cluster comprising a plurality of silicon-based devices, the plurality of silicon-based devices being arranged in a matrix formation, the matrix formation comprising x, y and z coordinates, the device-cluster comprising:
the plurality of silicon-based devices, the plurality of silicon-based devices being arranged within the cluster in predetermined rows, each device included in the plurality of silicon-based devices comprising a unique set of x, y and z coordinates, each device being located in a location that corresponds to the device's unique set of x, y and z coordinates;
a plurality of quantum cases, each of the plurality of the quantum cases encapsulating one of the silicon-based devices, each of quantum cases comprising:
a quantum random number generator, the quantum random number generator configured to generate quantum random numbers, the generated quantum random numbers being used to encrypt messages that are transmitted from each silicon-based device included within the quantum case included in the silicon-based device with which the quantum random number generator is included.
2. The matrix-computer-cluster ofclaim 1 wherein messages transmitted between devices within the cluster are randomly transmitted based on a random number generated by the quantum random number generator included in one of the quantum cases included in the plurality of quantum cases.
3. The matrix-computer-cluster ofclaim 1 wherein data received at the matrix-computer-cluster is stored within one of the plurality of silicon-based devices and the one of the plurality of silicon-based devices is selected randomly by the one of the quantum random number generators included in a quantum case included in the plurality of quantum cases.
4. The matrix-computer-cluster ofclaim 1 wherein each quantum case included in the plurality of quantum cases is comprised of quantum-tunneling material.
5. The matrix-computer-cluster ofclaim 2 wherein each quantum case is configured to communicate, leveraging quantum-tunneling properties, with devices external to the matrix-computer-cluster.
6. The matrix-computer-cluster ofclaim 2 wherein each quantum case is configured to communicate, leveraging quantum-tunneling properties, with the plurality of silicon-based devices.
7. A method for randomly transmitting messages between a plurality of silicon-based devices included in a matrix-computer-cluster, the plurality of silicon-based devices being arranged in predetermined rows within the matrix-computer-cluster in a matrix formation, said matrix formation comprising x, y and z coordinates, the method comprising:
encapsulating a first silicon-based device, included in the plurality of silicon-based devices, in a first quantum case;
generating a message at the first silicon-based device;
intercepting the message at the first quantum case;
generating a random number sequence at a first quantum random number generator, the first quantum random number generator being included in the first quantum case;
using the random number sequence to identify a set of x, y and z coordinates;
determining a second silicon-based device located at a location within the matrix-computer-cluster that corresponds to the identified x, y and z coordinates;
transmitting the message from the first silicon-based device to the second silicon-based device; and
receiving the message at the second silicon-based device.
8. The method ofclaim 7 wherein the transmitting the message between the first silicon-based device and the second silicon-based device is executed using quantum tunneling properties.
9. The method ofclaim 7 further comprising storing the message at the second silicon-based device.
10. The method ofclaim 7 further comprising transmitting the message from the second silicon-based device to an intended recipient device.
11. The method ofclaim 10 wherein the intended recipient device is a device internal to the matrix-computer-cluster.
12. The method ofclaim 10 wherein the intended recipient device is a device external to the matrix-computer-cluster.
13. The method ofclaim 12 further comprising:
generating a second quantum random number sequence at a quantum random number generator included in a second quantum case that encapsulates the second silicon-based device;
encrypting the message at the second silicon-based device with the second quantum random number sequence; and
transmitting the encrypted message to the device external to the matrix-computer-cluster.
14. A method for randomly storing data received at a plurality of silicon-based devices included in a matrix-computer-cluster, the plurality of silicon-based devices being arranged in predetermined rows within the matrix-computer-cluster in a matrix formation, said matrix formation comprising x, y and z coordinates, the method comprising:
encapsulating a first silicon-based device, included in the plurality of silicon-based devices, in a first quantum case;
receiving a data element at the first silicon-based device;
intercepting the data element at the first quantum case;
generating a random number sequence at a first quantum random number generator, the first quantum random number generator being included in the first quantum case;
using the random number sequence to identify a set of x, y and z coordinates;
determining a second silicon-based device located at a location within the matrix-computer-cluster that corresponds to the identified set of x, y and z coordinates;
transmitting the data element from the first silicon-based device to the second silicon-based device; and
storing the data element at the second silicon-based device.
15. The method ofclaim 14 wherein the transmitting the data element between the first silicon-based device and the second silicon-based device is executed using quantum tunneling properties.
16. The method ofclaim 14 wherein the data is received at the first silicon-based device using quantum tunneling properties.
17. The method ofclaim 14 further comprising:
receiving a request from a requesting device to access the data element at the first silicon-based device; and
rerouting the request to the second silicon-based device.
18. The method ofclaim 17 wherein the requesting device is external to the matrix-computer-cluster.
19. The method ofclaim 14 further comprising:
receiving a request from a requesting device to access the data element at the first silicon-based device; and
responding to the requesting device with data relating to the second silicon-based device.
20. The method ofclaim 19 wherein the requesting device is within the matrix-computer-cluster.
US16/670,9072019-10-312019-10-31Matrix-based quantum-resilient server-clusterActive2041-03-25US11468356B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US16/670,907US11468356B2 (en)2019-10-312019-10-31Matrix-based quantum-resilient server-cluster

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US16/670,907US11468356B2 (en)2019-10-312019-10-31Matrix-based quantum-resilient server-cluster

Publications (2)

Publication NumberPublication Date
US20210133615A1true US20210133615A1 (en)2021-05-06
US11468356B2 US11468356B2 (en)2022-10-11

Family

ID=75688707

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US16/670,907Active2041-03-25US11468356B2 (en)2019-10-312019-10-31Matrix-based quantum-resilient server-cluster

Country Status (1)

CountryLink
US (1)US11468356B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP3985499B1 (en)*2020-10-142023-03-22Schneider Electric Industries SASMethod for generating random numbers

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7706535B1 (en)2003-03-212010-04-27Bbn Technologies Corp.Systems and methods for implementing routing protocols and algorithms for quantum cryptographic key transport
US7519641B2 (en)2003-08-272009-04-14Id Quantique S.A.Method and apparatus for generating true random numbers by way of a quantum optics process
JP2005117511A (en)2003-10-102005-04-28Nec CorpQuantum cipher communication system and quantum cipher key distributing method used therefor
US7697693B1 (en)2004-03-092010-04-13Bbn Technologies Corp.Quantum cryptography with multi-party randomness
FR2879381B1 (en)2004-12-152008-12-26Thales Sa QUANTUM QUANTUM DISTRIBUTION SYSTEM OF CONTINUOUSLY VARIABLE ENCRYPTION KEY
US7590868B2 (en)2005-02-092009-09-15Hewlett-Packard Development Company, L.P.Method and apparatus for managing encrypted data on a computer readable medium
EP2014009A2 (en)2006-04-182009-01-14MagiQ Technologies, Inc.Key management and user authentication for quantum cryptography networks
US7577257B2 (en)2006-12-212009-08-18Verizon Services Operations, Inc.Large scale quantum cryptographic key distribution network
US8380880B2 (en)2007-02-022013-02-19The Mathworks, Inc.Scalable architecture
GB0801395D0 (en)2008-01-252008-03-05Qinetiq LtdNetwork having quantum key distribution
GB0819665D0 (en)2008-10-272008-12-03Qinetiq LtdQuantum key dsitribution
US8582769B2 (en)2009-10-092013-11-12Nec Laboratories America, Inc.Secure communication over passive optical network (PON) with quantum encryption
JP2011130120A (en)2009-12-162011-06-30Sony CorpQuantum public key cryptosystem, key generation device, encryption device, decoder, key generating method, encryption method, and decoding method
KR101351012B1 (en)2009-12-182014-01-10한국전자통신연구원Method and apparatus for authentication user in multiparty quantum communications
US8483394B2 (en)2010-06-152013-07-09Los Alamos National Security, LlcSecure multi-party communication with quantum key distribution managed by trusted authority
TW201201556A (en)2010-06-292012-01-01Chunghwa Telecom Co LtdConstruction structure of quantum encryption service network
US9663358B1 (en)2011-07-192017-05-30Quantum Valley Investment Fund LPProcessing quantum information
EP2555466B1 (en)2011-08-052014-07-02SELEX ES S.p.A.System for distributing cryptographic keys
US8897449B1 (en)2011-09-122014-11-25Quantum Valley Investment Fund LPQuantum computing on encrypted data
FR2980933B1 (en)2011-09-302016-12-23Centre Nat De La Rech Scient - Cnrs METHOD AND DEVICE FOR SYNCHRONIZING INTRICATION SOURCES FOR QUANTUM COMMUNICATION NETWORK
US8693691B2 (en)2012-05-252014-04-08The Johns Hopkins UniversityEmbedded authentication protocol for quantum key distribution systems
US9471280B2 (en)*2014-01-142016-10-18The Regents Of The University Of MichiganExtraction of random numbers from physical systems
US10127499B1 (en)2014-08-112018-11-13Rigetti & Co, Inc.Operating a quantum processor in a heterogeneous computing architecture
CN105827397B (en)2015-01-082019-10-18阿里巴巴集团控股有限公司 Quantum key distribution system, method and device based on trusted relay
US10333908B2 (en)2015-02-032019-06-25SecuritiNet Inc.Transaction-based secure information delivery and assessment
US10296047B2 (en)2015-08-042019-05-21Apple Inc.Input mechanism with deformable touch-sensitive material
WO2017035268A1 (en)2015-08-242017-03-02Ricardo Richard FrederickData obfuscation method and service using unique seeds
US10068183B1 (en)2017-02-232018-09-04Edico Genome, Corp.Bioinformatics systems, apparatuses, and methods executed on a quantum processing platform
US20190322298A1 (en)2018-04-202019-10-24General Electric CompanyLocomotive control system
US20180089733A1 (en)2016-08-192018-03-29Future Dial, Inc.System and method for enhanced retail device testing and evaluation
US11120357B2 (en)2017-03-102021-09-14Rigetti & Co, Inc.Quantum approximate optimization
US10644882B2 (en)2017-04-252020-05-05Bank Of America CorporationElectronic security keys for data security based on quantum particle states
US10432663B2 (en)2017-04-252019-10-01Bank Of America CorporationElectronic security keys for data security based on quantum particle states that indicates type of access
US10977570B2 (en)2017-06-192021-04-13Rigetti & Co, Inc.Distributed quantum computing system
US10567359B2 (en)2017-07-182020-02-18International Business Machines CorporationCluster of secure execution platforms
US10554397B2 (en)2017-09-272020-02-04The Boeing CompanyQuantum-based data encryption
WO2019204213A1 (en)2018-04-152019-10-24Cooner JasonEncryption for blockchain cryptocurrency transactions and uses in conjunction with carbon credits
WO2020028589A1 (en)2018-07-312020-02-06Americorp Investments LlcTechniques for expediting processing of blockchain transactions
US10552120B1 (en)2018-08-202020-02-04Wells Fargo Bank, N.A.Systems and methods for single chip quantum random number generation
US10708046B1 (en)2018-11-082020-07-07Nxgen Partners Ip, LlcQuantum resistant blockchain with multi-dimensional quantum key distribution
US11271724B2 (en)2019-02-212022-03-08Quantum Lock, Inc.One-time-pad encryption system and methods
US11601272B2 (en)2019-05-022023-03-07Ares Technologies, Inc.Methods and systems for efficient cryptographic third-party authentication of asset transfers using trusted computing
US11424918B2 (en)2019-05-032022-08-23Quantumxchange, Inc.Method of operation of a trusted node software in a quantum key distribution system
US11283594B2 (en)2019-06-052022-03-22International Business Machines CorporationContext data update in a blockchain network
US20210081935A1 (en)2019-09-132021-03-18MobileCoinSystem and method for providing privacy-preserving proofs of membership
LT6793B (en)2020-05-182020-12-28Timofey MochalovMethod for protecting data transfer using neural cryptography

Also Published As

Publication numberPublication date
US11468356B2 (en)2022-10-11

Similar Documents

PublicationPublication DateTitle
CA3057854C (en)Method and system for hierarchical cryptographic key management
Elgendy et al.An efficient and secured framework for mobile cloud computing
CN106209353A (en)Key management method and system thereof
Kaur et al.Analyzing data security for cloud computing using cryptographic algorithms
CN114035907B (en)Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container
CN114826733B (en)File transmission method, device, system, equipment, medium and program product
Saini et al.E2EE for data security for hybrid cloud services: a novel approach
US20140012992A1 (en)Computational Resource Allocation System, A Code Analysis Framework, And A Method For Computational Resource Allocation System
US12316753B1 (en)Secure multi-agent system for privacy-preserving distributed computation
CN110378128A (en)Data ciphering method, device and terminal device
US11468356B2 (en)Matrix-based quantum-resilient server-cluster
Shehzad et al.A novel hybrid encryption scheme to ensure Hadoop based cloud data security
Gupta et al.Data storage security in cloud computing using container clustering
US10997521B1 (en)Quantum-resilient computer cluster
CN109684856B (en) A data security method and system for MapReduce computing
CN103729324A (en)Security protection device of cloud storage file based on USB3.0 interface
Saxena et al.An intelligent security centered resource-efficient resource management model for cloud computing environments
Srinivas et al.Cloud-Block: An Integrated Cloud and Blockchain using Secure Cloud Computing
CN114647868A (en)Secure computing method, apparatus, device, medium, and program product
Xiao et al.Hardware/software adaptive cryptographic acceleration for big data processing
Panimalars et al.Cloud Data Security Using Elliptic Curve Cryptography
Saxena et al.Protecting data storage on cloud to enhance security level and processing of the data by using Hadoop
Pardeshi et al.Enhancing information security in cloud computing environment using cryptographic techniques
CN118300832B (en)Multi-device access platform processing method and system
Will et al.Enclave Management Models for Safe Execution of Software Components.

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:BANK OF AMERICA CORPORATION, NORTH CAROLINA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KVOCHKO, ELENA;BARRAZA ENCISO, MARIA CAROLINA;REEL/FRAME:050885/0317

Effective date:20191031

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp